This article describes research that looks at how structure is now used and might be better used in support of personal information management (PIM). Efforts to structure personal information find expression in various ...

In this paper we report on our research and design efforts to provide Rwandans with access to and reuse of video interviews from the International Criminal Tribunal for Rwanda. More generally, we investigate methods and ...

Through the use of an on-line questionnaire and in-depth observation sessions, we examined how people produce tactile graphics (raised images that are designed to be read by the fingers) for blind students and how they use ...

Personal Information Management (PIM) refers to both the practice and the study of the activities people perform in order to acquire, organize, maintain and retrieve information for everyday use. One ideal of PIM is that ...

The Future InfoExpo was important because it demonstrates “proof of concept” of new or expanded functions and capabilities in 3D, immersive virtual environments and offers clear directions for future research. Users and ...

For the past decade, the Value Sensitive Design Research Lab now at the University of Washington has been investigating privacy in public in relation to information technologies. More recently, we have begun collaborations ...

To facilitate the design of effective web sites for classroom-based
courses, we developed a systematic heuristic evaluation methodology
and relevant heuristics. To facilitate reuse of the methodology, we
developed an ...

The Universal Labeler (UL) supports a single, unified scheme of “labeling” which can be applied to organize various kinds of information including electronic documents, email messages and web references. The UL takes a ...

We developed an interactive movie to educate people who do not have impairments about how people who do have certain impairments experience the World Wide Web. We walk the viewer through the experiences of five people who ...

XooML takes a step towards addressing a basic tension in the development of supporting tools of Personal Information Man-agement (PIM) and, more generally, in the development of com-puter-based tools for end users: How to ...